Daily Arxiv

This is a page that curates AI-related papers published worldwide.
All content here is summarized using Google Gemini and operated on a non-profit basis.
Copyright for each paper belongs to the authors and their institutions; please make sure to credit the source when sharing.

Entropy-Based Non-Invasive Reliability Monitoring of Convolutional Neural Networks

Created by
  • Haebom

Author

Amirhossein Nazeri, Wael Hafez

Outline

This paper presents a novel method for monitoring the entropy of convolutional neural networks (CNNs) activations to address their vulnerability to adversarial attacks. Unlike existing adversarial attack detection methods that require model retraining, network architecture modification, or performance degradation on normal inputs, our method detects adversarial inputs by detecting changes in activation entropy without model modification. Experimental results using VGG-16 show that adversarial inputs consistently change the activation entropy by approximately 7% in the early convolutional layers, achieving 90% detection accuracy and keeping false positive and false negative rates below 20%. This result demonstrates that CNNs inherently encode distributional changes in their activation patterns, suggesting that activation entropy alone can be used to assess the reliability of CNNs. Therefore, this study enables the practical deployment of self-diagnostic vision systems that detect adversarial inputs in real time without model degradation.

Takeaways, Limitations

Takeaways:
Enables adversarial attack detection on CNNs without model modification.
Presenting the feasibility of implementing a self-diagnostic vision system for real-time adversarial input detection.
A CNN reliability evaluation method using activation entropy is presented.
Achieves high detection accuracy (90%) and low error rate (less than 20%).
Limitations:
Only experimental results for the VGG-16 model are presented, so further research is needed to determine generalizability to other CNN architectures.
Additional evaluation of detection performance against various types of adversarial attacks is needed.
Further validation of performance and robustness in real-world environments is needed.
👍